2018 International Conference on Soft-Computing and Network Security (ICSNS) 2018
DOI: 10.1109/icsns.2018.8573616
|View full text |Cite
|
Sign up to set email alerts
|

Demonetization: a Visual Exploration and Pattern Identification of People Opinion on Tweets

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
4
0

Year Published

2019
2019
2021
2021

Publication Types

Select...
8

Relationship

0
8

Authors

Journals

citations
Cited by 14 publications
(4 citation statements)
references
References 4 publications
0
4
0
Order By: Relevance
“…In addition with the resource allocation, the surveillance networks need the security level to the atmost degree for the efficient and reliable communication. Many video sensor applications are equipped with sensors such as agricultural assisting robot [30], industrial automation [31,36], and smart vehicles [32,35] where security is not prioritized as it is dealt with the sensor data [37,39]. But in the sensitive applications such as military surveillance areas, cyber agencies and banking sectors the ocular and streaming data is the primary source which need high protection.…”
Section: Our Contributionsmentioning
confidence: 99%
“…In addition with the resource allocation, the surveillance networks need the security level to the atmost degree for the efficient and reliable communication. Many video sensor applications are equipped with sensors such as agricultural assisting robot [30], industrial automation [31,36], and smart vehicles [32,35] where security is not prioritized as it is dealt with the sensor data [37,39]. But in the sensitive applications such as military surveillance areas, cyber agencies and banking sectors the ocular and streaming data is the primary source which need high protection.…”
Section: Our Contributionsmentioning
confidence: 99%
“…The research and the experiments of VANETs are focused to utilize road safety information among vehicles to prevent accidents. The future vehicles will be equipped with sensors delivering various parameters (Balaanand et al 2015(Balaanand et al , 2018Maram et al 2019;Anupriya et al 2018), which will be displayed to the driver or transmitted to a RSU, which is a part of the VANET infrastructure. These parameters are also broadcasted to neighboring vehicles (Zeadally et al 2012).…”
Section: Vanets: An Overviewmentioning
confidence: 99%
“…4b), and even the two Bdistinguishable EEG^signal can be detected by this arrangement. The fractional sampling rate of the AAWT gives shift-invariance, analytic covering, and flexible time-frequency covering [3,9,14,79,7]. This analytic base provides the In AAWT, obtaining the real transformation includes an iterated filter bank [17,72] that is designed with the combination of sums and differences of the one low pass channel for negative-frequency and two pass channels for positive frequency channels as shown in Fig.…”
Section: Decomposition Using Adjustable Analytic Wavelet Transform (Aawt)mentioning
confidence: 99%